Operating System Security : Security Policies
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 7
Abstract
Security is the primary concern in the modern world. The main focus of this paper is the security of our information and its supporting infrastructure. By keeping the computer system secure we can provide the security to the computerized information and vital to that is the operating system. In order to have a secure operating system it must be supported by the suitable computer architecture. If the technology from which the OS is built and on which it is supported is not secure then there is no confidentiality in the security of the OS and of the information it maintains for the users. This is the short overview of OS Security. In this paper we will discuss about the security policies that can be supported by the system.
Authors and Affiliations
Sarika Choudhary
Using Queuing theory the performance measures of cloud with infinite servers
Cloud computing has got enormous popularity as it offers dynamic, low-cost computing solutions. To get the service of cloud the user has to be in queue until he is served. Each arriving Cloud computing User (CCU) request...
IMAGE MINING TECHNIQUES: A LITERATURE SURVEY
Nowadays, a large portion of information is in visual form; it is essential and certainly pleasing to search for images. Image mining has a variety of applications in various sectors like medical diagnosis, biology, remo...
Mobicast Routing Protocol with Multiple Sink Zone Formation in Underwater Sensor Networks
In this paper, we groping the multiple Sink Zone formation Mobicast routing protocol for 3-D Underwater Sensor Networks (USNs). The 3-D USNs consists a number of sensor nodes which are deployed in 3-D environment and Sen...
Intrusion Detection System with Data Stream Modeling using Conditional Privileges
IDS for computer network is capable of detecting and alerting the systems administrator on potential intrusion, providing guidance against any potential loss of integrity and confidentiality to the enterprise’s valuable...
IMPACT AND UTILIZATION OF PROJECTORS IN HIGHER EDUCATION WITH LOW ENERGY CONSUMPTION AND LAST LONG BATTIES IN WSN ENVIRONMENT
It has been observed that in Higher Education there is no proper utilization of modern techniques and utilization of ICT. There are several types of modern technology used in class room to delivered lectures so, that stu...